Information operations have been conducted by militaries since the earliest days of warfare. Sun Tzu wrote of the importance of information supremacy to the military commander and of the importance of controlling information within the battle space.

LEUT Matt Westwood

Military cyber operations take many guises and in the operational domain remain shrouded in extreme secrecy. As defined by the United States Department of Defense (DoD) Law of War Manual (2015) cyber operations employ “cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.

LEUT Max Westwood

Cyberspace is a component of the global information domain consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers, and their resident data (ADF, 2010).

Lieutenants Luke Boswell, Connor Mooney-Collett and James Keane

Maritime security incidents in 2019 saw coordinated attacks against commercial shipping near the Strait of Hormuz, off the Port of Fujairah, and in the Sea of Oman.

CAPT Michael Beard

This volume examines the impact of the submarine threat on Australia’s maritime defence from 1915 to 1954 and assesses the effectiveness of the RAN in dealing with the trade defence problem over this period.

David Stevens

The security of submarine communications cables (SCCs) is vital to Australia’s strategic and economic interests. Transoceanic information flows for military, government, corporate and private communications rely almost entirely on SCCs.

Angus Eckstein